How Honeytokens Can Detect and Stop Black Hat Computer Hackers

How Honeytokens Can Detect and Stop Black Hat Computer Hackers

| | honeytokens
Detect & stop black hat hackers with honeytokens. Placed in datasets, these mimic real data, triggering alerts upon interaction. Bolster your cybersecurity now! ... Read More
How to Become Great at API Key Rotation: Best Practices and Tips

How to Become Great at API Key Rotation: Best Practices and Tips

| | Best Practices
Secret management can be a complex challenge, especially when you are trying to do it in a way that is right for security. Key rotation is a big piece of that puzzle. In this article, we will take you from zero to hero on key rotation ... Read More
The New Frontier in Cybersecurity: Embracing Security as Code

The New Frontier in Cybersecurity: Embracing Security as Code

| | DevSecOps
Security as Code (SaC) is a term often used with DevSecOps, but what does it mean exactly? Learn best practices and key components for a more secure and efficient development process ... Read More
Dynamic Application Security Testing: Benefits, Pitfalls, and Top Open-Source Solutions

Dynamic Application Security Testing: Benefits, Pitfalls, and Top Open-Source Solutions

| | DevSecOps
In code security, not everything is "shift left." Dynamic testing is as important to help developers build and ship secure applications on the right-hand side of the SDLC. Let's explore the benefits, pitfalls, and popular open-source DAST tools in this blog post from the Escape team ... Read More
The Significance of Honeypots and the Rise of Honeytokens

The Significance of Honeypots and the Rise of Honeytokens

|
Discover the roles and risks of honeypots and honeytokens in cybersecurity with this article. Understand how they work, the benefits they bring to your security strategy, and the precautions needed to avoid potential pitfalls ... Read More
Secure by Default: Integrating GitGuardian in Vermeer's Software Development Lifecycle

Secure by Default: Integrating GitGuardian in Vermeer’s Software Development Lifecycle

| | Customer Stories
Discover how Vermeer Corporation transformed its software development lifecycle to prioritize security. Learn about their journey from open-source tools to adopting GitGuardian for seamless, integrated secret scanning, enhancing DevSecOps with a 'Secure by Default' approach ... Read More
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes

Uncovering thousands of unique secrets in PyPI packages

Security Researcher Tom Forbes worked with the GitGuardian team to analyze all the code committed to PyPi packages and surfaced thousands of hardcoded credentials ... Read More
How to Handle Secrets in Helm

How to Handle Secrets in Helm

| | Best Practices
Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today! ... Read More
Protecting Your Software Supply Chain: Understanding Typosquatting and Dependency Confusion Attacks

Protecting Your Software Supply Chain: Understanding Typosquatting and Dependency Confusion Attacks

| | supply chain security
Typosquatting and dependency confusion are two common tactics used by hackers to exploit open-source package repositories. Understand how these attacks work and discover preventive measures to secure your infrastructure ... Read More
Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

| | Tutorials
This tutorial helps you better understand AWS Secrets Manager, how it works under the hood and how to access it from Kubernetes clusters ... Read More